Describe if a firewall is enabled on your machine

Assignment Help Computer Network Security
Reference no: EM131445121

Assignment: Data Breaches

The head of the IT security department expressed her concerns about series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings.

You have been asked to provide a summary of information to the entire team about data breaches and suggest proactive and preventative measures for warding off viruses. Your presentation will be sent out to all company employees, so the information must be clear, concise, and informative.

To prepare your presentation, use your personal computer to perform the following tasks:

• Identify whether you have an anti-virus software running on your machine and from which company.

• Identify if a firewall is enabled on your machine and if you need Windows® firewall running in addition, if that anti-virus software is installed on your machine.

Include the following in your summary:

• Definition of a data breach
• Ways to determine if your system was infected with a virus
• At least three preventive measures against data breaches, both physical or digital
• Instructions on locating anti-virus and firewall software
• Instructions on what to do if a virus has infected your computer

Choose one of the following options for your summary:

• A 2- to 3-minute podcast using the software of your choice, such as Sound Recorder or Audacity to create your audio file and save as a MP3 or WAV.

• A 2- to 3-minute video delivered as an MP4 or MOV file.

• Infographic or visual diagram delivered as a PDF. You may use any Microsoft Office product or free sites such as Piktochart, Easel.ly, or Canva to create an infographic.

• Another deliverable approved by your faculty member.

Reference no: EM131445121

Questions Cloud

Reactions and the final net ionic reaction : If you were to place sodium in a solution of iron(II) chloride, would a spontaneous reaction occur? If the reaction is spontaneous, write both ½ reactions and the final net ionic reaction.
How do the studies about crossmodal phenomena : Now imagine that this person suddenly receives the ability to see. Would the person, without using the sense of touch, be able to identify those same shapes visually? How do the studies about crossmodal phenomena inform us about the answer to this ..
Application of relevant income tax rules : Answer the question with reference to the relevant legislative provisions operating in Australia concerning the application of relevant income tax rules and formulas -
How many moles of vapor are present : 1. A 125mL Erlenmeyer flask has a measured volume of 148 mL. A 0.477 g sample of an unknown vapor occupies the flask at 94.8°C and a pressure of 736 mmHg. Assume ideal gas behavior: a. How many moles of vapor are present?
Describe if a firewall is enabled on your machine : Identify if a firewall is enabled on your machine and if you need Windows firewall running in addition, if that anti-virus software is installed on your machine.
Does trial proceed with a jury trial or a bench trial : CJ252:Bill slips a can of tuna in his pocket and forgets to pay. Is this shoplifting? Please explain how mens rea, actus reus, and corpus delecti are involved in this assessment.Stanley and Bill were interrogated at the police station. Both conced..
What is the pressure in the flask : 1) A piece of dry ice (CO2) has a mass of 23.50 g. It is dropped into an evacuated 2.00-L flask. What is the pressure in the flask at -7°C?
Show histogram of lookup delay for successfully resolved ips : CPS 470/570- Show the histogram of lookup delays for all successfully resolved IPs. Histograms are plotted by partitioning a dataset into fixed bins and counting the fraction of data in each bin.
Describe a negotiation for significant purchase : Plan, execute, and describe a negotiation that you are planning on conducting for either a significant purchase (e.g., house, car, major appliance) a significant decision (e.g., a project at work, budgeting process) or a contract negotiation.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Difference between symmetric and asymmetric encryption

Write a very brief scenario of what "could" happen if a brand new Linux user accidentally logged in as root instead of as another type of user. Try to make your scenario as realistic as possible, but limit it to two sentences.List one difference b..

  Using cbc mode of operation what are consequences

Using CBC mode of operation what are the consequences of decrypting the cipher text if it has an error in the first bit of the first block C?

  What are some of the barriers to widespread connectivity

What are connectivity standards and how do they affect the ability of one provider to connect to another?

  What the phases of penetration testing

What the phases of penetration testing? What is a component of most modern attacks? What is the difference between the phases of penetration testing and the attacker kill chain?

  Describe copyright-public domain and fair use

Briefly describe copyright, public domain, and fair use. Provide a unique example of fair use. Provide an example of when copyright would be violated. Be sure not to duplicate an example that is already posted by one of your classmates times roman..

  Analyze current state of insider threats to computer systems

Analyze the current state of insider threats to computer systems and infrastructure in terms of numbers, costs and potential problems. What are the various profiles of insiders who may compromise your systems?

  Talks about the employee specific security

Following standard talks about the employee specific security, Following standard has good information on setting up IT security policies

  Describe the impact and the vulnerability of the scada

Describe the impact and the vulnerability of the SCADA/Stuxnet Worm on the critical infrastructure of the United States and describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains.

  What are the security issues of this

The majority of Australian SMEs are not taking advantage of cloud computing services, though uptake is strengthening among individuals, according to new research.

  Security administrator of a major organization

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer

  Explain the general intent of a trojan horse

Explain the general intent of a Trojan horse.

  Vehicle identification number

Your final project is to create a site to manage a car lot.  Your program must let people signup to input cars for sale and display those cars for sale on the home page in a table grid view.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd